{"id":"https://openalex.org/W2584878234","doi":"https://doi.org/10.1080/01611194.2016.1238423","title":"Modern breaking of Enigma ciphertexts","display_name":"Modern breaking of Enigma ciphertexts","publication_year":2017,"publication_date":"2017-01-31","ids":{"openalex":"https://openalex.org/W2584878234","doi":"https://doi.org/10.1080/01611194.2016.1238423","mag":"2584878234"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2016.1238423","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063233072","display_name":"Olaf Ostwald","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Olaf Ostwald","raw_affiliation_strings":["View further author information"],"affiliations":[{"raw_affiliation_string":"View further author information","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066433626","display_name":"Frode Weierud","orcid":"https://orcid.org/0000-0003-2998-0340"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Frode Weierud","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.95,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":8,"citation_normalized_percentile":{"value":0.968872,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"41","issue":"5","first_page":"395","last_page":"421"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9837,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9801,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/closeness","display_name":"Closeness","score":0.58193105},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.49404076}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7858225},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.7408132},{"id":"https://openalex.org/C2779545769","wikidata":"https://www.wikidata.org/wiki/Q5135364","display_name":"Closeness","level":2,"score":0.58193105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.56222975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5269364},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.49404076},{"id":"https://openalex.org/C154775046","wikidata":"https://www.wikidata.org/wiki/Q188","display_name":"German","level":2,"score":0.4143901},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36333007},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.34812796},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33250216},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30859685},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.21430758},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0938606},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2016.1238423","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1660562555","https://openalex.org/W1966474627","https://openalex.org/W1981346141","https://openalex.org/W1985978006","https://openalex.org/W1991068735","https://openalex.org/W2012563446","https://openalex.org/W2013763930","https://openalex.org/W2048595549","https://openalex.org/W2049795142","https://openalex.org/W2057702219","https://openalex.org/W2072933174","https://openalex.org/W2077844305","https://openalex.org/W2109394932","https://openalex.org/W2228083200","https://openalex.org/W4289127653","https://openalex.org/W590145760"],"related_works":["https://openalex.org/W4310649982","https://openalex.org/W4294104609","https://openalex.org/W4236344152","https://openalex.org/W3042758862","https://openalex.org/W2997530193","https://openalex.org/W2942137924","https://openalex.org/W2939324531","https://openalex.org/W2802117553","https://openalex.org/W2011667854","https://openalex.org/W1589129854"],"abstract_inverted_index":{"\"Breaking":[0],"German":[1],"Army":[2],"Ciphers\"":[3],"is":[4,72,117,121],"the":[5,14,51,56,65,91,102,128],"title":[6],"of":[7,17,23,30,34,38,86,105,127],"a":[8,31,35,43,87,95,113,124],"Cryptologia":[9],"article":[10],"from":[11],"2005,":[12],"describing":[13],"lucky":[15,60],"survival":[16],"several":[18],"hundred":[19],"authentic":[20],"Enigma":[21,70],"messages":[22,71],"World":[24],"War":[25],"II,":[26],"and":[27,54,62,109],"an":[28,106,132],"account":[29],"ciphertext-only":[32,67],"cryptanalysis":[33],"large":[36],"number":[37],"these":[39],"messages,":[40],"leaving":[41],"only":[42,112],"few":[44,114],"(mostly":[45],"short":[46,79],"messages)":[47],"unbroken.":[48],"After":[49],"reviewing":[50],"work":[52],"done,":[53],"investigating":[55],"reasons":[57],"for":[58,90],"both":[59],"breaks":[61],"close":[63],"misses,":[64],"modern":[66],"attack":[68],"on":[69,75,101],"improved,":[73],"especially":[74],"genuine":[76],"ones":[77],"with":[78,111,131],"lengths":[80],"and/or":[81],"many":[82],"garbles.":[83],"The":[84,99,119,136],"difficulties":[85],"proper":[88],"measure":[89],"candidate's":[92],"closeness":[93],"to":[94],"plaintext":[96],"are":[97],"clarified.":[98],"influence":[100],"decryption":[103],"process":[104],"empty":[107],"plugboard":[108,129],"one":[110],"correct":[115],"plugs":[116],"examined.":[118],"method":[120],"extended":[122],"by":[123],"partial":[125],"exhaustion":[126],"combined":[130],"optimized":[133],"hillclimbing":[134],"strategy.":[135],"newly":[137],"designed":[138],"software":[139],"succeeds":[140],"in":[141],"breaking":[142],"formerly":[143],"unbroken":[144],"messages.":[145]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2584878234","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2024-12-14T03:01:10.656956","created_date":"2017-02-10"}